{"title":"Modified Architecture for the Sub-Keys Model","authors":"K. A. Omar, D. L. Wells","doi":"10.1109/SP.1983.10008","DOIUrl":null,"url":null,"abstract":"A secure implementation for subkey database encryption is presented. Both Vertical and Horizontal access to the control encrypted date are defined and described. Communication protocols between user and system are also provided.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1983 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1983.10008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
A secure implementation for subkey database encryption is presented. Both Vertical and Horizontal access to the control encrypted date are defined and described. Communication protocols between user and system are also provided.